Data security is obviously becoming more important for anyone involved in computer security. Encryption methods have become more advanced over the years, and there are plenty of tools available that will prevent intruders from accessing confidential data on an active network. However, one of the easiest methods for would-be attackers to gather confidential information is by recovering data from discarded computer hardware or other storage media. This paper covers security concerns related to end of life computer equipment and methods for properly destroying information so it cannot be recovered.